If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

lets say i were to use a wireless interface? (in this case ath0 or rausb0)

So essentially you are asking if you could use another interface than the one in the script? Yes you could, and you do not have to let airbase-ng respond to all ESSID probes sent out for it to work either. The only difference then will be that the clients have to manually choose to connect to your AP.

As a side not the steps presented in your previous post seem to leave out all steps needed to actually forward the traffic from airbase-ng to your actual connection. Leaving out this will naturally prevent the clients from accessing the internet and there won't be any traffic for you to sniff using ettercap.

Great thread, thanks to all who are contributing, the script has encouraged me to try a few of my own (simple WEP connection etc) an improvement on the usual "what wifi card should I buy"...

I have successfully created the rogue AP and can connect and surf various sites on the internet (I am using a ALFA for the rogue AP) and have the settings at 1400 as per the script.

Once surfing though, I can enable the remote_browser plug in on the ettercap shell which shows the websites being visted but cannot get it configured to show passwords etc? I have tried to use ettercap in another shell but it just closes?

Is this a limitation of this type of setup or a limitation of my brain?

Also I have been reading the thread about WirelessKeyHarvesting and am struggling to get it to work on this rogue AP (I havent managed to get it to work on any setup as yet)
Any pointers?

Thanks again to all contributers and to all you knowledgable people thank you for sharing...

non transparent fake access point with a redirection to a local http server hosting a metasploit payload hidden as a windows update exe, metasploit listener activated with a meterpreter auto script to upload wireless key viewer and download key file.

Enter the name of the interface connected to the internet, for example eth0: ath0
Enter your wireless interface name, for example wlan0: rausb0
Enter the ESSID you would like your rogue AP to be called, for example Free WiFi: doNOTconnect
./rogueAP.sh: line 7: kill: (9592) - No such process
dhcpd: no process killed
airbase-ng: no process killed
ettercap: no process killed

Enter the name of the interface connected to the internet, for example eth0: ath0
Enter your wireless interface name, for example wlan0: rausb0
Enter the ESSID you would like your rogue AP to be called, for example Free WiFi: doNOTconnect
./rogueAP.sh: line 7: kill: (9592) - No such process
dhcpd: no process killed
airbase-ng: no process killed
ettercap: no process killed

at0: ERROR while getting interface flags: No such device
SIOCSIFADDR: No such device
at0: ERROR while getting interface flags: No such device
SIOCSIFNETMASK: No such device
SIOCSIFMTU: No such device
SIOCADDRT: No such process
X Error: BadWindow (invalid Window parameter) 3
Major opcode: 20
Minor opcode: 0
Resource id: 0x2400007

any advice on how i can get this to work?

For one reason or another your Tun device isnt getting set up correctly. You need to check to make sure that your airbase AP is actually set up, if so then you need to use ifconfig to put up the tun device.

ifconfig at0 up
ifconfig at0 10.0.0.1 netmask 255.255.255.0 (or whatever you have based on your dhcpd.conf

Morpheus: "You take the blue pill - the story ends, you wake up in your bed and believe whatever you want to believe. You take the red pill - you stay in Wonderland and I show you how deep the rabbit-hole goes."